<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SAML Entra ID/Azure VPN authentication - only external users getting &amp;quot;Matching client config not found&amp;quot; error in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/saml-entra-id-azure-vpn-authentication-only-external-users/m-p/600017#M5922</link>
    <description>&lt;P&gt;so how I fixed this issue by inviting the external users guest in our &lt;SPAN&gt;Entra ID&amp;nbsp;&lt;/SPAN&gt;and allowing access to the VPN that way. not sure that will work for you or not&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 10 Oct 2024 08:59:10 GMT</pubDate>
    <dc:creator>din100</dc:creator>
    <dc:date>2024-10-10T08:59:10Z</dc:date>
    <item>
      <title>SAML Entra ID/Azure VPN authentication - only external users getting "Matching client config not found" error</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/saml-entra-id-azure-vpn-authentication-only-external-users/m-p/599886#M5917</link>
      <description>&lt;DIV class="text-neutral-content"&gt;
&lt;DIV class="mb-sm  mb-xs px-md xs:px-0 overflow-hidden" data-post-click-location="text-body"&gt;
&lt;DIV id="t3_1fzqpg1-post-rtjson-content" class="md text-14" style="--emote-size: 20px;"&gt;
&lt;P&gt;Hey,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a really strange issue and I don't know how to solve it. We created and authentication profile and mapped it to our portal. Users from our domain lets call it ourcompanydomain, are able to connect&amp;nbsp; with GlobalProtect-VPN (which opens M365 Loginpage) without any issues. But when external users are doing the same, they get "Matching client config not found" error. By the way Conditional Access settings in Entra ID are working as they should according to Sign in Logs and they accepted the invitation to our tenant as external guests.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I looked upon the Monitoring Logs for GlobalProtect and I saw that external users (their source user) show up as john.lennon#EXT#@ourcompanydomain.onmicrosoft.com, but our internal users show up as &lt;A class="relative pointer-events-auto a cursor-pointer
  
  
  
  
  underline
  " href="mailto:ringo.star@ourcompanydomain.com" target="_blank" rel="noopener nofollow ugc"&gt;ringo.star@ourcompanydomain.com&lt;/A&gt; . This is because in Entra ID the UPN name has a different format for external users. Therefore I changed the Claims in Entra ID (Attributes &amp;amp; Claims) to send user.mail instead of the UPN name to the firewall (both for username and Name ID claims).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now when an external user is trying to connect the correct mailadress/source user, is shown in monitoring in the correct format. But the "matching client config not found" error still shows up and I don't know why. In the gateway's client settings the user is added to the source user list and it's exactly the same as the the source user in monitoring.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I set the gateway to allow any user in the gateway's client settings, connection is established without any problems so it definitely is some kind some usermatching of matching error.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I already deleted c:\users\username\AppData\Local\Palo Alto Networks\GlobalProtect .dat files as some websites suggest, but it doesn't help.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 09 Oct 2024 13:10:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/saml-entra-id-azure-vpn-authentication-only-external-users/m-p/599886#M5917</guid>
      <dc:creator>Wimazal</dc:creator>
      <dc:date>2024-10-09T13:10:40Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Entra ID/Azure VPN authentication - only external users getting "Matching client config not found" error</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/saml-entra-id-azure-vpn-authentication-only-external-users/m-p/600012#M5921</link>
      <description>&lt;P&gt;&lt;STRONG&gt;SOLUTION FOUND&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's a Palo Alto interpretation problem, because the FW is not able to interpret @ symbols from external Entra Users (user.mail) and match them with users in Gateways's Client settings (for whatever reason) even though the source user (mail-address) is exactly the same in monitoring and gateway setting.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Solution:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Entra &amp;gt; Enterprise Applications &amp;gt; Palo Alto Networks &amp;gt; Single sign on &amp;gt; Edit Attributes &amp;amp; Claims &amp;gt; set unique user identifier (name id) to user.mail and username output must be transformed &amp;gt; source &amp;gt; transformation &amp;gt; RegexReplace &amp;gt; Attribute name usermail &amp;gt; Regex pattern = @[\w.-]+ &amp;gt; Replacement pattern = _entra &amp;gt; Add &amp;gt; Save.&lt;/P&gt;
&lt;P&gt;Replace "@domain.xy with _entra for each user in the Gateway's client settings.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2024 07:28:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/saml-entra-id-azure-vpn-authentication-only-external-users/m-p/600012#M5921</guid>
      <dc:creator>Wimazal</dc:creator>
      <dc:date>2024-10-10T07:28:16Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Entra ID/Azure VPN authentication - only external users getting "Matching client config not found" error</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/saml-entra-id-azure-vpn-authentication-only-external-users/m-p/600017#M5922</link>
      <description>&lt;P&gt;so how I fixed this issue by inviting the external users guest in our &lt;SPAN&gt;Entra ID&amp;nbsp;&lt;/SPAN&gt;and allowing access to the VPN that way. not sure that will work for you or not&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2024 08:59:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/saml-entra-id-azure-vpn-authentication-only-external-users/m-p/600017#M5922</guid>
      <dc:creator>din100</dc:creator>
      <dc:date>2024-10-10T08:59:10Z</dc:date>
    </item>
  </channel>
</rss>

